April 23, 2015 By Douglas Bonderud 2 min read

So-called “doxing” occurs when malicious actors gather private information about an individual online and then post that data publicly. While it occasionally happens to private citizens who run afoul of cybercriminal groups or journalists who cover cybersecurity stories, there is a new target on the horizon: public officials. According to a new warning from the U.S. Computer Emergency Readiness Team (US-CERT), both law enforcement personnel and public officials are being victimized by these cyberattacks.

New Risks

As noted by the FBI’s recent public service announcement, it’s not just personal doxing that should worry public officials. Hacktivist groups are also targeting family members of government personnel in an effort to compromise their safety or compel a specific response. Additionally, the announcement warns about the rise of “swatting,” in which anonymous reporters call police and claim high-risk criminal incidents are taking place at a victim’s address, prompting a large-scale law enforcement response. The result? Unwanted attention and wasted tax dollars.

So how worrisome is doxing? A recent Ars Technica article describes the experience of one writer who found himself on the receiving end of such a cyberattack. With private details such as his name, address and phone number posted publicly online, he ended up with multiple unwanted deliveries to his door and text messages on his phone.

For public officials, there are higher risks. For example, if details about which schools their children attend are leaked or information about their personal schedules is compromised, there is a real risk of kidnapping or home intrusion. According to Gizmodo, the militant Islamic State group recently posted personal information about more than 100 American military personnel online in hopes that supporters in the United States would seek out and cause harm to these soldiers.

Staying Safe From Cyberattacks

Along with its warning, US-CERT also linked to its tips on staying safe when using social networking sites since this is often the fastest path to compromise for both government officials and law enforcement personnel. It works like this: Police officers or government officials post something using an official Twitter handle or post a blog on their organization’s website. However, in many cases, these “secure” communications contain links to personal social media profiles, which reveal unwanted details.

Protecting this data is a two-step process. First, using easily found social profiles — for example, those that are publicly viewable and use real names — makes doxing cyberattacks simple for cybercriminals. Instead, it’s a good idea to use aliases where possible and require approval to view any images or posted content. The same goes for family members, whose profiles often provide clues about family life and personal habits.

Second, it is also essential to monitor email communications. Always use encrypted message services, and never rely on insecure public wireless connections. It is also important to take precautions offline, such as restricting driver’s license and vehicle information with the Department of Motor Vehicles and real estate data with land title agencies. Finally, public officials should take the time to periodically run their name through a public search engine and see what comes up; there may be surprises in store.

Ultimately, doxing and other information-gathering cyberattacks will always find a foothold, especially in the lives of public officials and law enforcement agents. The goal, however, is to make hacktivists work hard enough for the information they want that their efforts are detected, giving time for potential victims to react and respond.

Image Source: iStock

More from

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today